Cargando…

Deploying a modern security data lake /

Cybersecurity experts are overwhelmed, constantly on guard against malicious activity on their networks. Further complicating these external assaults are internal risks arising from simple errors, disgruntled employees, and outdated software configurations. Security experts today must act on the ass...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Baum, David (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Sebastopol, CA : O'Reilly Media, Inc., 2022.
Edición:First edition.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a22000007i 4500
001 OR_on1338158471
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu|||unuuu
008 220802s2022 caua o 000 0 eng d
040 |a ORMDA  |b eng  |e rda  |e pn  |c ORMDA  |d OCLCF  |d OCLCQ  |d OCLCO 
020 |z 9781098134976 
029 1 |a AU@  |b 000072345626 
035 |a (OCoLC)1338158471 
037 |a 9781098134983  |b O'Reilly Media 
050 4 |a QA76.9.A25 
082 0 4 |a 005.8  |2 23/eng/20220802 
049 |a UAMI 
100 1 |a Baum, David,  |e author. 
245 1 0 |a Deploying a modern security data lake /  |c by David Baum. 
250 |a First edition. 
264 1 |a Sebastopol, CA :  |b O'Reilly Media, Inc.,  |c 2022. 
300 |a 1 online resource (45 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
520 |a Cybersecurity experts are overwhelmed, constantly on guard against malicious activity on their networks. Further complicating these external assaults are internal risks arising from simple errors, disgruntled employees, and outdated software configurations. Security experts today must act on the assumption that all applications, services, identities, and networks are under threat. This report examines how security data lakes can complement or replace the traditional SIEM model. Author David Baum describes how to deploy a modern security data lake, using your organization's existing cloud data platform to deliver comprehensive visibility and powerful automation across multiple security use cases. Heads of cybersecurity, security operations, and data science will learn how to deliver comprehensive visibility and powerful automation across multiple security use cases. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security. 
650 0 |a Internet  |x Security measures. 
650 0 |a Cloud computing  |x Security measures. 
650 6 |a Sécurité informatique. 
650 6 |a Internet  |x Sécurité  |x Mesures. 
650 6 |a Infonuagique  |x Sécurité  |x Mesures. 
650 7 |a Computer security  |2 fast 
650 7 |a Internet  |x Security measures  |2 fast 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781098134983/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP